System Security Certified Practitioner (SSCP 2018): Digital Forensics
Intermediate
- 13 videos | 46m 58s
- Includes Assessment
- Earns a Badge
This course explores key aspects of digital forensics by looking at device usage while helping prepare learners for the Systems Security Certified Practitioner (SSCP) certification exam. In 13 videos, you will examine evidence gathering, chain of custody, data recovery, hard drive scrubbing, IP address tracking, and memory forensics. You will learn that a crucial aspect of digital forensics is the gathering of evidence in a lawful manner. Next, learners will examine how to determine when events occurred, when files were modified, when certain websites were accessed, and when messages were received. You will examine the chain of custody for preservation of evidence, and having a detailed account of gathering and handling evidence. This course demonstrates how to recover deleted data, and how to use a steganography tool to hide data in plain sight. You will examine memory forensics, a subset of digital forensics. This course then discusses the NIST (National Institute of Standards and Technologies) document publication 800-86. Finally, learn how to create a raw image of a hard disk drive.
WHAT YOU WILL LEARN
-
List steps taken by digital forensic investigatorsDescribe the order of volatility and preservation of sceneDescribe how evidence must be gathered and preserved for legal admissibilityRecover deleted dataExtract insights from stored web browser dataUse software to permanently remove hard disk data
-
Describe how vpns and proxies are used to hide network identitiesUse tools to track the origin of an ip addressUncover hidden data using a steganography toolDescribe insights that can be gathered from memory dumpsUse the linux dd command to create a disk imageUse common tools to gather digital evidence
IN THIS COURSE
-
1m 58s
-
3m 33sUpon completion of this video, you will be able to list the steps taken by digital forensic investigators. FREE ACCESS
-
4m 47sUpon completion of this video, you will be able to describe the order of volatility and preservation of a scene. FREE ACCESS
-
3m 51sAfter completing this video, you will be able to describe how evidence must be gathered and preserved to be admissible in a legal setting. FREE ACCESS
-
3m 47sIn this video, you will learn how to recover deleted data. FREE ACCESS
-
6m 11sIn this video, you will extract insights from stored web browser data. FREE ACCESS
-
2m 6sIn this video, learn how to use software to permanently delete hard disk data. FREE ACCESS
-
2m 27sAfter completing this video, you will be able to describe how VPNs and proxies are used to conceal network identities. FREE ACCESS
-
4m 39sTo find out how to use tools to track the origin of an IP address, consult a search engine. FREE ACCESS
-
3m 40sIn this video, find out how to uncover hidden data using a steganography tool. FREE ACCESS
-
3m 55sUpon completion of this video, you will be able to describe insights that can be gathered from memory dumps. FREE ACCESS
-
2m 45sDuring this video, you will learn how to use the Linux dd command to create an image of a disk. FREE ACCESS
-
3m 17sIn this video, you will learn how to use common tools to collect digital evidence. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.